2022
DOI: 10.1049/sfw2.12085
|View full text |Cite
|
Sign up to set email alerts
|

A model for developing dependable systems using a component‐based software development approach (MDDS‐CBSD)

Abstract: Component-based software development (CBSD) is an emerging technology that integrates existing software components to swiftly develop and deploy big and complex software systems with little engineering effort, money, and time. CBSD, on the other hand, has difficulties with security trust, particularly dependability. When a system provides the desired outcomes while causing no harm to the environment, it is said to be dependable. Dependability encompasses several attributes, including availability, confidential… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 58 publications
0
2
0
Order By: Relevance
“…Sensitive data is delivered from terminals to the analysis layers via connection components throughout the whole cycle of an IoT system. To protect data from abuse and exploitation against cyber-attacks, IoT systems must adhere to adequate security procedures such as using secure communication protocols, encryption, and firewalls as well as the implementation of privacy policies and technologies to protect the personal data of users [36,44,45]. Every element of an IoT system that is compromised might ultimately cause the entire process to collapse.…”
Section: A Internet Of Things Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Sensitive data is delivered from terminals to the analysis layers via connection components throughout the whole cycle of an IoT system. To protect data from abuse and exploitation against cyber-attacks, IoT systems must adhere to adequate security procedures such as using secure communication protocols, encryption, and firewalls as well as the implementation of privacy policies and technologies to protect the personal data of users [36,44,45]. Every element of an IoT system that is compromised might ultimately cause the entire process to collapse.…”
Section: A Internet Of Things Overviewmentioning
confidence: 99%
“…This is extremely difficult given the large number of resources that will be required to create future e-learning systems. This problem might be solved by utilizing and creating techniques for scheduling, optimization, reuse software components and strategic planning as well as the utilization of alternative energy sources [45]. Moreover, several elearning platforms use hybrid Cloud as their business architecture to host IoT applications.…”
Section: B Rq5: Challenges and Future Directions Of Iot In E-mentioning
confidence: 99%